[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

ACM TechNews Alert for Monday, June 7, 2004



Title: ACM TechNews (HTML)
Read the TechNews Online at: http://www.acm.org/technews/
ACM TechNews
June 7, 2004

Dear ACM TechNews Subscriber:

Welcome to the June 7, 2004 edition of ACM TechNews, providing timely information for IT professionals three times a week. For instructions on how to unsubscribe from this service, please see below.

ACM's MemberNet is now online. For the latest on ACM activities, member benefits, and industry issues

Remember to check out our hot new online essay and opinion magazine, Ubiquity.

Sponsored by
AutoChoice Advisor Logo

Looking for a NEW vehicle? Discover which ones are right for you from over 250 different makes and models. Your unbiased list of vehicles is based on your preferences and years of consumer input. [try it]


HEADLINES AT A GLANCE:

  • Finding Out What's Bugging Computers
  • Human Responses to Technology Scrutinized
  • Building a Better Bot
  • First Quantum Cryptography Network Unveiled
  • What Is Google's Secret Weapon? An Army of Ph.D.'s
  • CHI 2004
  • Once More Please, With Feeling
  • Access Patterns Organize Data
  • Survey Finds Older IT Employees
  • Researchers Build What They Envision as Wearable Computers
  • 'NIP' and Tuck?
  • A SuperMap for Special Ops--Or Business Travelers
  • Hacking Sparks Need for Complex Passwords
  • Your Next Computer
  • New Threat, New Defense
  • Send in the Swarm
  • The Eyes of the Machine
  • 10 Best Bet Technologies

     

    Finding Out What's Bugging Computers

    One solution to the rampant problem of buggy software is to test the code thoroughly before its public release, which is a much more complex endeavor than it sounds. "There's not enough time in the life of the universe to check one million lines of code," explains Bell Labs director of systems ...

    [read more]      to the top


    Human Responses to Technology Scrutinized

    Studies show that people make a strong emotional connection to technology, and tend to anthropomorphize it. Rosalind Picard, director of Affective Computing Research at the MIT Media Lab, stated at a recent American Association for the Advancement of Science lecture, "The way people ...

    [read more]      to the top


    Building a Better Bot

    Automated machines that work in teams are being developed for such tasks as building scientific outposts on the moon, studying a planet's makeup for signs of past life, and paving the way for space colonization. NASA Jet Propulsion Laboratory computer scientist Terry Huntsberger is leading ...

    [read more]      to the top


    First Quantum Cryptography Network Unveiled

    BBN Technologies' Quantum Net (Qnet) was inaugurated on June 3 with the first transmission of quantum encrypted data packets across the network. The Cambridge, Mass.-based Qnet consists of a fiber-optic cable network threaded 10 kilometers from BBN to Harvard University, while the network's ...

    [read more]      to the top


    What Is Google's Secret Weapon? An Army of Ph.D.'s

    Google, the next challenger to Microsoft's dominance in personal computing, may have an advantage in that its entire culture is infused with research lust: The company famously hires Ph.D.'s and encourages them to pursue independent projects alongside their everyday work at the company. Though ...

    [read more]      to the top


    ACM's CHI 2004

    The CHI 2004 conference showcased ideas that will transform how people interact with technology, including practical demonstrations and cutting-edge concept presentations; the conference was hosted by the ACM Special Interest Group on Computer-Human Interaction (SIGCHI), ...

    [read more]      to the top


    Once More Please, With Feeling

    Brigitte Krenn, coordinator for the Information Society Technologies program's Net Environments for Embodied Emotional Conversational Agents (NECA) project, believes the Internet's appeal could be significantly expanded through more "human" computer interfaces. Her project aims to ...

    [read more]      to the top


    Access Patterns Organize Data

    Old Dominion University researchers have devised a method that mimics the brain's ability to order information so that connections can be automatically established between digital objects; such a technique could one day enable information repositories to self-organize based on the way ...

    [read more]      to the top


    Survey Finds Older IT Employees

    A new report by the CIO Council's Workforce and Human Capital for IT Committee suggests that the information technology workforce of the federal government is aging, and may need an upgrade in skills. The approximately 20,000 responses to the Clinger-Cohen Assessment Survey reveal that the ...

    [read more]      to the top


    Researchers Build What They Envision as Wearable Computers

    Frederic Zenhausern of Arizona State University's Applied NanoBioscience Center and University of Arizona professor Ghassan Jabbour have teamed up to create two prototype "biometric bodysuits" that incorporate microelectronics. The Scentsory Chameleon Bodysuits were showcased last ...

    [read more]      to the top


    'NIP' and Tuck?

    The federal budget plan for fiscal year 2005 has added more fuel to the debate over innovation, writes Dominic Basulto. The proposed budget would cut funding for research and development for 21 of the top 24 federal agencies, while advocates of innovation are concerned that basic research ...

    [read more]      to the top


    A SuperMap for Special Ops--Or Business Travelers

    A team of researchers led by computer scientist Craig Knoblock of the University of Southern California's Viterbi School of Engineering Information Sciences Institute developed HeraclesMaps, a program that aggregates many years' worth of geographical data and presents it as a ...

    [read more]      to the top


    Hacking Sparks Need for Complex Passwords

    Regular passwords combined with a variable physical component, dubbed two-factor authentication, are becoming more popular as scammers get more clever about stealing passwords. Those who use static passwords often use combinations that are easy to guess, or use the same password for multiple ...

    [read more]      to the top


    Your Next Computer

    The evolution of cell phone technology is characterized by a shrinking form factor coupled with increasing intelligence, speed, and connectivity, and this trend is inspiring advocates to forecast the eventual replacement of PCs by mobile phones. This concept is sharply criticized by PC adherents ...

    [read more]      to the top


    New Threat, New Defense

    The threat of an attack by missiles laden with chemical or biological materials is spurring the development of network-centric warfare solutions, among them a battle management, command and control (BMC2) component for next-generation E-10A ground surveillance aircraft, which the Pentagon ...

    [read more]      to the top


    Send in the Swarm

    iRobot is developing robots that exhibit group behavior modeled after insect swarms for military applications such as reconnaissance and land-mine disposal with funding from the Defense Advanced Research Projects Agency. The Software for Distributed Robots project involves the ...

    [read more]      to the top


    The Eyes of the Machine

    EDN technical editor Robert Cravotta offers up machine-vision systems as an example of real-world data recognition systems, and explains that many factors have to be considered when choosing the best system. Users must select the kind of illumination or signal source that best accentuates and ...

    [read more]      to the top


    10 Best Bet Technologies

    Network Magazine pinpoints 10 technologies that will likely transform corporate networking, and that are connected in being horizontal, able to benefit the bottom line by boosting productivity and reducing costs, in a nascent stage of development, and likely to remain both radical and ...

    [read more]      to the top


    To submit feedback about ACM TechNews, contact: technews@xxxxxxxxxx

    To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to listserv@xxxxxxxxxxxxxxxxx with the line

    signoff technews

    in the body of your message.

    Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

    ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@xxxxxxx

    We will remove your name from the TechNews list on your behalf.

    For help with technical problems, including problems with leaving the list, please write to: technews-request@xxxxxxx

    to the top

    © Copyright 2004 Information, Inc.


  • © 2004 ACM, Inc. All rights reserved. ACM Privacy Policy.